52 research outputs found

    Nursing Care Aesthetic in Iran: A Phenomenological Study

    Get PDF
    Background: Despite the emphasis of contemporary nursing theories on the belief that nursing is a science and an art in care, published studies show that only the nursing science has developed. Many experts believe that by recognizing and perceiving this concept, the clinical field can develop aesthetic knowledge in nursing and education of students. Objectives: The purpose of this study was to explain clients and nurses perspective of nursing care aesthetics. Patients and Methods: Using an interpretive phenomenology, 12 clients and 14 nurses were interviewed. Participants in this study were purposefully selected and their experiences were analyzed using Van Manen’s hermeneutic phenomenological framework. Results: Emerged themes were as follows: subjective description, overt spirituality, opening desperate impasse, sense of unity, continue to shine, and painful pass and pleasing. According the participants experiences, nursing care aesthetics includes subjective description of spiritual and desirable caring behaviors combined with sense of unity and sympathy between the nurse and the patients, which leads to opening in desperate impasse with creating the feeling of satisfaction and peace in the patient. It is a shining of clinical capabilities and an action beyond what should be combined with a decorating care that leads to a pleasant ending against the pain and suffering of the others for the nurse. Conclusions: Many caring behaviors associate with aesthetic experience for both patients and nurses and despite two different views, findings of this study showed that these experiences were similar in most cases. The aesthetics of nursing care was defined as what reflects the holistic nature of nursing with an emphasis on spirituality and skill. Results of this study are effective in identification of the values existed in nurse caring behaviors and developing of profession by instruction, implementation, and evaluation them

    Social media and disasters: human security, environmental racism, and crisis communication in Hurricane Irma response

    Get PDF
    Social media has been widely recognized as key communication channel in disaster situations. However, there is limited empirical investigation on how the intersecting issues of social order, environmental impacts, and crisis communication unfold from the perspective of a social media user. This study examines 60,449 tweets to and from the news media in Florida during and immediately after Hurricane Irma in September, 2017. Based on a critical review of the literature coupled with an eight-category coding scheme (including second-hand reporting, reporting on self-experience, requesting help, coordinating relief efforts, and expressing well wishes), the article assesses the content and timing of tweets before, during, and after the storm. It finds that thematically, twitter coverage not only covers the storm itself but pressing social issues such as looting, price gouging, the privileging of elites in rebuilding efforts, environmental vulnerability, and abandoning pets. Temporally, the volume of different tweets peaked and dropped at different stages; for example, tweets about personal experience peaked when the hurricane hit the ground while requests for help peaked in the days after the hurricane. The study allows for a better understanding of the sociological, environmental, and even social justice impacts and related disaster response through the use of social media

    Insertional mutagenesis identifies multiple networks of cooperating genes driving intestinal tumorigenesis

    Get PDF
    The evolution of colorectal cancer suggests the involvement of many genes. We performed insertional mutagenesis with the Sleeping Beauty (SB) transposon system in mice carrying germline or somatic Apc mutation. Analysis of common insertion sites (CISs) isolated from 446 tumors revealed many hundreds of candidate cancer drivers. Comparison to human datasets suggested that 234 CIS genes are also deregulated in human colorectal cancers. 183 CIS genes are candidate Wnt targets, and 20 are shown to be novel modifiers of canonical Wnt signaling. We also identified gene mutations associated with a subset of tumors containing an expanded number of Paneth cells, a hallmark of deregulated Wnt signaling, and genes associated with more severe dysplasia included members of the FGF signaling cascade. Some 70 genes showed pairwise co-occurrence clustering into 38 sub-networks that may regulate tumor development

    Obesity and colorectal cancer: molecular features of adipose tissue

    Full text link

    Data security and privacy on the cloud: Driving to the next era of technology with confidence

    No full text
    Cloud services have gained popularity due to the number of advantages they provide to organizations and individuals such as reduced cost, better storage, and improved performance. However, a lot of organizations are still not willing to shift their traditional in-house services to the Cloud due to the various security implications. Many Cloud service users are worried about the security of their data and privacy being violated. There are many reported cases of Cloud service providers illegally collecting personal data of their customers, which has led to service providers being viewed with greater suspicion than before. To overcome this, Cloud service providers must ensure that they inform the users exactly about which data is being used and how it is used. While it is the duty of the Cloud service provider to protect the data confidentiality and privacy of their customers, this should not be misunderstood or misused by customers to conduct illegal activities because Cloud service providers have to abide by the rules and regulations, including co-operating with law enforcement agencies if they need any particular customer’s data. In this paper, we research the main security aspects for ensuring data confidentiality and privacy. © Springer Science+Business Media Singapore 2018
    • 

    corecore